An AWS CloudFront distribution uses a deprecated version of SSL/TLS
Severity | Exploitability | Providers | Categories |
---|---|---|---|
HIGH | LOW | AWS | NETWORK |
Description
Outdated TLS policies (version 1.0 and 1.1) rely on insecure cipher suites (SHA-1 and MD5), and are subject to a range of well known attack. Note that TLS 1.0 and 1.1 have been deprecated on March 25, 2021.
Allowing such policies can allow attacker to break the encryption, decrypt the traffic, and perform man-in-the-middle attacks.
Impact
Potential data exposure | Visible in logs | User interaction required | Privileges required |
---|---|---|---|
True | False | True | False |
Known vulnerabilities could be exploited with man-in-the-middle attacks and lead to data and credential leakage.
Remediation guidelines
The cloudfront minimum protocol version should be set to TLS v1.2 or above.
Note that this implies that the clients connecting to your endpoint must support TLS version 1.2 or above. Also, if the SSL certificate is the default CloudFront certificate, i.e the used domain is cloudfront.net (https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValues-security-policy), it won't be possible to set the minimum protocol version to TLS v1.2 or above. This policy should be ignored.